Information Security Consulting

Solutions for all of your technology needs

Your technology infrastructure is the backbone of your business. Unreliable and outdated systems hurt overall performance and put your bottom line at risk. Micron solves these problems with Inofrmation Security and Consulting services that are custom built to address your requirements. Micron’s IS Consulting experts are highly trained, certified engineers. From minor troubleshooting to complete evaluation, Micron provides solutions for all of your technology needs.

A Stateful firewall (any firewall that performs Stateful packet inspection (SPI) or Stateful inspection) is a firewall that keeps track of the state of network connections (such as TCP streams, UDP communication) traveling across it. The firewall is programmed to distinguish legitimate packets for different types of connections. Only packets matching a known connection state will be allowed by the firewall; others will be rejected.

Primarily firewall is deployed at perimeter of network to segregate internal network from internet. Though firewall segregates network with different level of trust it also enforces the access control policies to protect unauthorized access to network resources.

Benefits :

Access control policy Enforcement Protection from Vulnerable Services Controlled Access to Site with in the protected subnet Logging and Statistics of all internet access passes through firewall

Network Intrusion detection & Prevention systems :

An Intrusion Prevention System is a network security device that monitors and prevent network and/or system activities from malicious or unwanted behavior and can react, in real-time, to block these activities. It inspects the network traffic for malicious code or attacks, Application based threats. When a threat is detected by IPS, it can drop the offending packets while still allowing all other traffic to pass.

Benefits :

Access control for network and application-layer traffic. Protection from Application and database level attacks. Detect and prevent from intrusions, worms and malicious code.

Load balancing is a technonology to spread work between two or more servers, network links, to get optimal resource utilization, maximize throughput, and minimize response time. It uses multiple components with load balancing, instead of a single component and increase reliability through redundancy. Inbound & outbound traffic can be distribute across multiple servers or ISP Links to enhance the performance of the network links and servers and ensures that no single device is overloaded by a technology. Load balancing use the algorithms to load balance the traffic i.e. Least no. of user, Least no of connections, Round robin, Weight, Least traffic, connections and sessions.

Web filtering is the technology by which URL & Content can be blocked or allowed based on analysis of its URL & content, rather than its source or other criteria. It is most widely used on the internet to filter web access. Blocking access of unwanted web sites and content can be restricting by using as web filtering technology.

Benefits :

Saving Cost, by using web-filtering technology we can block unwanted internet
traffic like orkut.com, youtube.com etc and can save cost of internet. Saving Time, users will not able to browse entertainment sites, games sites
and can save their time. Productivity, after restricting unwanted sites and downloading user will only
concentrate on official work and the productivity will increase.

Mail Security :

Mail filtering is most commonly used group of methods to filter spam. Mail filters act on the content, Information contained in the mail body, or Mail headers (like Subject) to either classify, accept or reject a message.

Stops spam and phishing attacks using the mail security technology. :

Controls and monitors of inbound and outbound email. Prevents from viruses and malicious code.

Two-Factor Authentication :

An authentication factor is a piece of information and process used to authenticate or verify the identity of a person or other entity requesting access under security constraints. Two-factor authentication is a system in which two different factors are use in conjunction to authenticate. Two factors authentication delivers a higher level of authentication assurance.

Benefits :

Strong authentication: Token Two-factor authentication provides strong
authentication by requiring something like: Token device, OTP etc.High security: Two-factor authentication eliminates the security issues
arising from users writing down their passwords, using easy-to-hack
passwords, or using the same password for multiple applications.Compatibility and ease of integration: Two-factor solution can be use
with a variety of environments like operating systems including (Windows,
Linux and Mac OS) and can be integrate with user database like SQL, LDAP,
and Oracle etc to provide First-factor authentication.

End-Point Security

End-Point Encryption :

In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as cipher text). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).